vulnerability
Oracle Solaris 11: CVE-2020-18032 (11.4 SRU 35.94.4, 11.4 SRU 36.101.2)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Apr 29, 2021 | Jul 21, 2021 | Feb 17, 2022 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Apr 29, 2021
Added
Jul 21, 2021
Modified
Feb 17, 2022
Description
Buffer Overflow in Graphviz Graph Visualization Tools from commit ID f8b9e035 and earlier allows remote attackers to execute arbitrary code or cause a denial of service (application crash) by loading a crafted file into the "lib/common/shapes.c" component.
Solutions
oracle-solaris-11-4-upgrade-image-graphviz-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-java-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-lua-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-perl-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-perl-522-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-perl-532-2-47-1-11-4-36-0-1-101-0oracle-solaris-11-4-upgrade-image-graphviz-graphviz-php-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-php-73-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-php-74-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-python-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-python-27-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-python-37-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-python-39-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-ruby-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-sharp-2-47-1-11-4-35-0-1-94-2oracle-solaris-11-4-upgrade-image-graphviz-graphviz-tcl-2-47-1-11-4-35-0-1-94-2
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.